Anatomy of a Cyber Attack (Accounting & Auditing Conference)


CPE Credits



PICPA Member: $29 | Nonmember: $39

 More Information

Course No.

You will have up to 90 days after the date of purchase to complete the course and take the exam.


If you attended the Accounting Auditing Conference on December 7, 2016, this course would be considered a duplicate and cannot be used towards your CPE requirement.

Earn CPE anywhere!

Listen to Ken Pyle cover the following:

  • Trends in data security
  • Insurance risk
  • Cybersecurity risk in internal audits


Ken Pyle
DFDR Consulting LLC

Ken Pyle is a partner and Chief Information Security Officer of DFDR Consulting. He has specialized in Information Security, Computer Forensics, Enterprise Virtualization and Network Engineering. Ken has an extensive background in Network Penetration and Remediation, Compliance and Secure Design. Prior to joining DFDR, he served as a Security and Network Engineer for several Information Technology companies and as the IT Director/Security Engineer of a large accounting firm. Ken has consulted with financial institutions, banks, government defense contractors and other highly secure facilities on issues of Information Security, Computer Forensics and Secure Network Design.

Ken has lectured on Information Security and has published several whitepapers on subjects including public information gathering via Social Networking and Social Engineering. Ken was a featured speaker at the 2014, 2013 & 012 Wolters Kluwer CCH User Conference lecturing on "Information Security and Defending the Enterprise" and "Anatomy of a Cyber Attack". Ken is a regular lecturer and presenter on Information Security and has presented for several accounting associations and professional organizations including Prime Global, RBMA and AGN. Ken is also a subject matter expert for Information Security, appearing in industry publications such as Accounting Today and the New Jersey Law Journal. He was also recognized as a "40 under 40" by South Jersey Business People in 2015.

He holds numerous security and technology certifications from companies such as Guidance Software, EC-Council, Cisco, VMware, CompTIA and AccessData. Ken has published several software vulnerabilities and exploits, and is an active researcher. He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design.

March 2017

You May Also Like

A&A Hot Topics
Oct. 19 | Malvern
Hear an all-encompassing update on financial reporting risks for small and medium companies. Understand how evolving cybersecurity threats impact financial reporting and learn new ways to detect fraudulent financial reporting. ...
Cybersecurity Risk Management Program Essentials
Oct. 25 | Malvern
Learn the latest cybersecurity trends, manage risks, and ensure the right level of governance to safeguard your organization. Establish a baseline of critical components that must be incorporated into any ...
Internal Control Best Practices for Small and Medium-Size Entities
Nov. 16 | Harrisburg
Understand and adapt the 2013 COSO Internal Control – Integrated Framework (the COSO framework) to small and medium-size entities. Identify best practices for designing, implementing, monitoring, evaluating, and auditing cost-effective ...